Documentation ¶
Index ¶
- func NewAssumeRolePolicyDoc(r api.Role, oidcProviderArn string) (string, error)
- func NewAwsManager(sess *session.Session, logger logr.Logger, cN, oidcProviderArn string) controllers.AwsManager
- func NewPolicyDocumentString(p api.PolicySpec) (string, error)
- type AwsPolicy
- type PolicyDocument
- type RealAwsManager
- func (m RealAwsManager) AttachRolePolicy(roleName, policyARN string) error
- func (m RealAwsManager) CreatePolicy(policy api.Policy) error
- func (m RealAwsManager) CreateRole(role api.Role, permissionsBoundariesPolicyARN string) error
- func (m RealAwsManager) DeletePolicy(policyARN string) error
- func (m RealAwsManager) DeleteRole(roleName string) error
- func (m RealAwsManager) DetachRolePolicy(roleName, policyARN string) error
- func (m RealAwsManager) GetAttachedRolePoliciesARNs(roleName string) ([]string, error)
- func (m RealAwsManager) GetPolicyARN(pathPrefix, uniqueName string) (string, error)
- func (m RealAwsManager) GetRoleARN(roleName string) (string, error)
- func (m RealAwsManager) GetStatement(arn string) ([]api.StatementSpec, error)
- func (m RealAwsManager) PolicyExists(policyARN string) (bool, error)
- func (m RealAwsManager) RoleExists(roleName string) (bool, error)
- func (m RealAwsManager) UpdatePolicy(policy api.Policy) error
- type RoleDocument
- type RoleStatement
- type Statement
- type StatementEffect
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func NewAssumeRolePolicyDoc ¶
func NewAwsManager ¶
func NewAwsManager(sess *session.Session, logger logr.Logger, cN, oidcProviderArn string) controllers.AwsManager
func NewPolicyDocumentString ¶
func NewPolicyDocumentString(p api.PolicySpec) (string, error)
Types ¶
type AwsPolicy ¶
type AwsPolicy struct { ARN string Statement []api.StatementSpec }
type PolicyDocument ¶
type RealAwsManager ¶
func (RealAwsManager) AttachRolePolicy ¶
func (m RealAwsManager) AttachRolePolicy(roleName, policyARN string) error
func (RealAwsManager) CreatePolicy ¶
func (m RealAwsManager) CreatePolicy(policy api.Policy) error
func (RealAwsManager) CreateRole ¶
func (m RealAwsManager) CreateRole(role api.Role, permissionsBoundariesPolicyARN string) error
func (RealAwsManager) DeletePolicy ¶
func (m RealAwsManager) DeletePolicy(policyARN string) error
func (RealAwsManager) DeleteRole ¶
func (m RealAwsManager) DeleteRole(roleName string) error
func (RealAwsManager) DetachRolePolicy ¶ added in v0.1.0
func (m RealAwsManager) DetachRolePolicy(roleName, policyARN string) error
func (RealAwsManager) GetAttachedRolePoliciesARNs ¶
func (m RealAwsManager) GetAttachedRolePoliciesARNs(roleName string) ([]string, error)
func (RealAwsManager) GetPolicyARN ¶
func (m RealAwsManager) GetPolicyARN(pathPrefix, uniqueName string) (string, error)
Gets an aws policy on aws
func (RealAwsManager) GetRoleARN ¶
func (m RealAwsManager) GetRoleARN(roleName string) (string, error)
func (RealAwsManager) GetStatement ¶
func (m RealAwsManager) GetStatement(arn string) ([]api.StatementSpec, error)
func (RealAwsManager) PolicyExists ¶
func (m RealAwsManager) PolicyExists(policyARN string) (bool, error)
func (RealAwsManager) RoleExists ¶
func (m RealAwsManager) RoleExists(roleName string) (bool, error)
func (RealAwsManager) UpdatePolicy ¶
func (m RealAwsManager) UpdatePolicy(policy api.Policy) error
type RoleDocument ¶
type RoleDocument struct { Version string Statement []RoleStatement }
type RoleStatement ¶
type RoleStatement struct { Effect StatementEffect Principal struct { Federated string } `json:"Principal"` Action string Condition struct { StringEquals map[string]string } }
type Statement ¶
type Statement struct { Effect StatementEffect Action []string Resource string }
func (Statement) ToSpec ¶
func (s Statement) ToSpec() api.StatementSpec
type StatementEffect ¶
type StatementEffect string
const ( StatementAllow StatementEffect = "Allow" StatementDeny StatementEffect = "Deny" )
todo : remove this
Click to show internal directories.
Click to hide internal directories.